van Leeuwen, B.P., Eldridge, J.M., Urias, V., & Urias, V. (2022). Cyber Analysis Emulation Platform for Wireless Communication Network Protocols [Conference Poster]. https://www.osti.gov/biblio/2002387
Publications
Search results
Jump to search filtersvan Leeuwen, B.P., Gao, J.H., Yin, K.H., Anthony, B., Urias, V., & Urias, V. (2019). Networked-based Cyber Analysis using Deep Packet Inspection (DPI) for High-Speed Networks. https://doi.org/10.2172/1863848
Urias, V., Stout, W., Loverro, C., van Leeuwen, B.P., & van Leeuwen, B.P. (2019). Get Your Head out of the Clouds:An Illusion of Privacy & Confidentiality [Conference Poster]. https://www.osti.gov/biblio/1639308
Stout, W., van Leeuwen, B.P., Urias, V., Tuminaro, J., Dossaji, N., & Dossaji, N. (2018). Leveraging a LiveNirtual/Constructive Testbed for the Evaluation of Moving Target Defenses [Conference Poster]. Proceedings - International Carnahan Conference on Security Technology. https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85060720435&origin=inward
Stout, W., van Leeuwen, B.P., Urias, V., Tuminaro, J., Dossaji, N., & Dossaji, N. (2018). Leveraging a LiveNirtual/Constructive Testbed for the Evaluation of Moving Target Defenses [Conference Poster]. Proceedings - International Carnahan Conference on Security Technology. https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85060720435&origin=inward
van Leeuwen, B.P., Lin, H.W., Stout, W., & Stout, W. (2018). Applying a Threat Model to Cloud Computing (Slides) [Conference Poster]. https://www.osti.gov/biblio/1884191
Stout, W., Urias, V., van Leeuwen, B.P., Lin, H.W., & Lin, H.W. (2018). Cyber Range Infrastructure Limitations and Needs of Tomorrow: A Position Paper (Presentation) [Conference Poster]. https://www.osti.gov/biblio/1806935
Stout, W., Urias, V., van Leeuwen, B.P., Lin, H.W., & Lin, H.W. (2018). Cyber Range Infrastructure Limitations and Needs of Tomorrow: A Position Paper [Conference Poster]. https://www.osti.gov/biblio/1594636
Stout, W., Urias, V., van Leeuwen, B.P., & van Leeuwen, B.P. (2018). On the Feasibility of Generating Deception Environments for Industrial Control Systems [Conference Poster]. https://www.osti.gov/biblio/1594646
van Leeuwen, B.P., Urias, V., Stout, W., Lin, H.W., & Lin, H.W. (2018). Applying a Threat Model to Cloud Computing [Conference Poster]. https://www.osti.gov/biblio/1594657
Han, E., Urias, V., van Leeuwen, B.P., Stout, W., Kao, G.K., Lin, H.W., & Lin, H.W. (2018). It?s Raining Clouds: Maintaining Visibility in the Haze [Conference Poster]. https://www.osti.gov/biblio/1569684
van Leeuwen, B.P., Eldridge, J.M., Urias, V., & Urias, V. (2017). Emulation Platform for Cyber Analysis of Wireless Communication Network Protocols [Conference Poster]. https://www.osti.gov/biblio/1510655
van Leeuwen, B.P., Eldridge, J.M., & Eldridge, J.M. (2017). Emulation Platform for Cyber Analysis of Wireless Communication Network Protocols. https://doi.org/10.2172/1410244
Onunkwo, U., Ganti, A., Mitchell, J.A., Scoggin, M., Schroeppel, R.C., van Leeuwen, B.P., Wolf, M., & Wolf, M. (2017). High Fidelity Simulations of Large-scale Wireless Networks (Part II - FY2017). https://doi.org/10.2172/1489863
Onunkwo, U., Ganti, A., Scoggin, M., Schroeppel, R.C., van Leeuwen, B.P., & van Leeuwen, B.P. (2017). A Novel Approach to Exponential Speedup of Simulation Events in Wireless Networks [Conference Poster]. https://www.osti.gov/biblio/1508481
Onunkwo, U., Ganti, A., Schroeppel, R.C., Scoggin, M., van Leeuwen, B.P., & van Leeuwen, B.P. (2017). A novel approach to exponential speedup of simulation events in wireless networks [Conference Poster]. https://www.osti.gov/biblio/1456754
Stout, W., Urias, V., van Leeuwen, B.P., Lin, H.W., & Lin, H.W. (2017). Dynamic Cybersecurity Training Environments for an Evolving Cyber Workforce (Presentation) [Conference Poster]. https://www.osti.gov/biblio/1456599
Stout, W., Urias, V., van Leeuwen, B.P., Lin, H.W., & Lin, H.W. (2017). Dynamic Cybersecurity Training Environments for an Evolving Cyber Workforce [Conference Poster]. https://www.osti.gov/biblio/1426377
van Leeuwen, B.P., Stout, W., Urias, V., & Urias, V. (2016). Empirical assessment of network-based Moving Target Defense approaches [Conference Poster]. Proceedings - IEEE Military Communications Conference MILCOM. https://doi.org/10.1109/MILCOM.2016.7795421
van Leeuwen, B.P., Stout, W., Urias, V., & Urias, V. (2016). MTD Assessment Framework with Cyber Attack Modeling [Conference Poster]. https://doi.org/10.1109/CCST.2016.7815722
Onunkwo, U., Cole, R., Ganti, A., Schroeppel, R.C., Scoggin, M., van Leeuwen, B.P., & van Leeuwen, B.P. (2016). High Fidelity Simulations of Large-Scale Wireless Networks (Part I). https://doi.org/10.2172/1343654
van Leeuwen, B.P., Stout, W., Urias, V., & Urias, V. (2016). MTD assessment framework with cyber attack modeling [Conference Poster]. Proceedings - International Carnahan Conference on Security Technology. https://doi.org/10.1109/CCST.2016.7815722
Cole, R., Ganti, A., Onunkwo, U., Schroeppel, R.C., Scoggin, M., van Leeuwen, B.P., & van Leeuwen, B.P. (2016). High Fidelity Simulations of Large-Scale Wireless Networks [Conference Poster]. https://www.osti.gov/biblio/1368502
van Leeuwen, B.P., Stout, W., Urias, V., & Urias, V. (2015). Operational cost of deploying Moving Target Defenses defensive work factors [Conference Poster]. Proceedings - IEEE Military Communications Conference MILCOM. https://doi.org/10.1109/MILCOM.2015.7357570
Stout, W., Urias, V., van Leeuwen, B.P., & van Leeuwen, B.P. (2015). Operational Cost of Deploying Moving Target Defense: Defensive Work Factors [Conference Poster]. https://www.osti.gov/biblio/1340132
Wright, B., Urias, V., van Leeuwen, B.P., Stout, W., & Stout, W. (2015). Emulytics? at Sandia National Laboratories [Conference Poster]. https://www.osti.gov/biblio/1245789
Wright, B., Urias, V., van Leeuwen, B.P., Stout, W., & Stout, W. (2015). Emulytics? at Sandia National Laboratories [Conference Poster]. https://www.osti.gov/biblio/1245788
Miner, N.E., van Leeuwen, B.P., Welch, K.M., Estill, M., Smith, M.A., le, H.D., Lawton, C., & Lawton, C. (2012). Evaluating communications system performance effects at a system of systems level [Conference]. Proceedings - IEEE Military Communications Conference MILCOM. https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84874334555&origin=inward
van Leeuwen, B.P., Urias, V., & Urias, V. (2012). High-fidelity Live, Virtual, Constructive (LVC) environments for cyber analysis [Conference]. https://www.osti.gov/biblio/1294170
van Leeuwen, B.P., Urias, V., Richardson, B., & Richardson, B. (2012). Supervisory Control and Data Acquisition (SCADA) System Cyber Security Analysis using a Live Virtual and Constructive (LVC) Testbed [Conference]. https://www.osti.gov/biblio/1116282
Urias, V., van Leeuwen, B.P., & van Leeuwen, B.P. (2012). Supervisory Command and Data Acquisition (SCADA) system Cyber Security Analysis using a Live Virtual and Constructive (LVC) Testbed [Conference]. https://www.osti.gov/biblio/1117295
Miner, N.E., van Leeuwen, B.P., Smith, M.A., Welch, K.M., Estill, M., & Estill, M. (2011). Bridging the Information Gap Between Diverse Modeling and Simulation Too [Conference]. https://www.osti.gov/biblio/1106273
van Leeuwen, B.P., Eldridge, J.M., Leemaster, J.E., & Leemaster, J.E. (2011). SpaceWire model development technology for satellite architecture. https://doi.org/10.2172/1031315
van Leeuwen, B.P., Eldridge, J.M., Leemaster, J.E., & Leemaster, J.E. (2011). SPACEWIRE NETWORK SIMULATION OF SYSTEM TIME PRECISION [Conference]. https://www.osti.gov/biblio/1143497
van Leeuwen, B.P., Urias, V., Eldridge, J.M., Villamarin, C., Olsberg, R., & Olsberg, R. (2010). Performing cyber security analysis using a live, virtual, and constructive (LVC) testbed [Conference]. Proceedings - IEEE Military Communications Conference MILCOM. https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=79951656480&origin=inward
van Leeuwen, B.P., Urias, V., Eldridge, J.M., Villamarin, C., & Villamarin, C. (2010). Cyber security analysis testbed : combining real, emulation, and simulation [Conference]. https://www.osti.gov/biblio/1021580
Miner, N.E., van Leeuwen, B.P., Smith, M.A., Welch, K.M., & Welch, K.M. (2010). Evaluating military information system performance effects at a system of systems level [Conference]. https://www.osti.gov/biblio/1011630
Burton, D., Tarman, T.D., van Leeuwen, B.P., Onunkwo, U., Urias, V., McDonald, M.J., & McDonald, M.J. (2009). Simulated, Emulated, and Physical Investigative Analysis (SEPIA) of networked systems. https://doi.org/10.2172/972865
van Leeuwen, B.P., Burton, D., McDonald, M.J., Onunkwo, U., & Onunkwo, U. (2009). Simulated Emulated and Physical Investigative Analysis (SEPIA) of Networked Systems [Conference]. https://www.osti.gov/biblio/1142858
van Leeuwen, B.P., Miner, N.E., Rigdon, J.B., Parker, E.P., & Parker, E.P. (2009). SIMULATED COMMUNICATION NETWORKS WITH OPNET MODELER AND JCSS USED IN LIVE VIRTUAL & CONSTRUCTIVE (LVC) EXPERIMENTS [Conference]. https://www.osti.gov/biblio/1142488
van Leeuwen, B.P., Onunkwo, U., McDonald, M.J., McDonald, M.J., & McDonald, M.J. (2008). BGP analysis using System-in-the-Loop (SITL) testbed [Conference]. https://www.osti.gov/biblio/1145146
van Leeuwen, B.P., Onunkwo, U., McDonald, M.J., & McDonald, M.J. (2008). BGP Analysis using System-in-the-Loop (SITL) Testbed [Conference]. https://www.osti.gov/biblio/1143198
Lee, E., Michalski, J.T., Sholander, P.E., van Leeuwen, B.P., & van Leeuwen, B.P. (2006). Virtual control system environment: A modeling and simulation tool for process control systems [Conference]. 5th International Topical Meeting on Nuclear Plant Instrumentation Controls, and Human Machine Interface Technology (NPIC and HMIT 2006). https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=34047141756&origin=inward
Lee, E., Michalski, J.T., Sholander, P.E., van Leeuwen, B.P., & van Leeuwen, B.P. (2006). Copy of Virtual Control System Environment: A Hybrid Testbed for Process Control Systems [Conference]. https://www.osti.gov/biblio/1264093
van Leeuwen, B.P., Michalski, J.T., Lee, E., & Lee, E. (2006). National SCADA Test Bed: FY05 Progress on Virtual Control System Environment (VCSE). https://doi.org/10.2172/1323931
Feddema, J.T., Byrne, R.H., Lewis, C., Harrington, J.J., Kilman, D., van Leeuwen, B.P., Robinett, R.D., & Robinett, R.D. (2005). Advanced mobile networking, sensing, and controls. https://doi.org/10.2172/922748
van Leeuwen, B.P., Oppel, F., & Oppel, F. (2004). High Level Architecture (HLA) federation with Umbra and OPNET federates. https://doi.org/10.2172/918767
van Leeuwen, B.P., Anderson, W.E., Michalski, J.T., & Michalski, J.T. (2003). Enhancements for distributed certificate authority approaches for mobile wireless ad hoc networks. https://doi.org/10.2172/918261
Draelos, T.J., Torgerson, M.D., Berg, M.J., Campbell, P.L., Duggan, D.P., van Leeuwen, B.P., Young, W., Young, M.L., & Young, M.L. (2003). Distributed Denial-of-Service Characterization. https://doi.org/10.2172/820887
van Leeuwen, B.P., Torgerson, M.D., & Torgerson, M.D. (2002). Performance Impacts of Lower-Layer Cryptographic Methods in Mobile Wireless Ad Hoc Networks. https://doi.org/10.2172/805840
Torgerson, M.D., van Leeuwen, B.P., & van Leeuwen, B.P. (2001). Routing Data Authentication in Wireless Networks. https://doi.org/10.2172/787792
van Leeuwen, B.P. (1998). Effective Protocols for Mobile Communications and Networking. https://doi.org/10.2172/2758